{"id":6549,"date":"2024-03-13T21:37:29","date_gmt":"2024-03-13T16:07:29","guid":{"rendered":"https:\/\/shreshtait.com\/blog\/?p=6549"},"modified":"2024-03-13T21:37:30","modified_gmt":"2024-03-13T16:07:30","slug":"shadowfindr-uncover-domain-shadowing-attacks","status":"publish","type":"post","link":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/","title":{"rendered":"ShadowFindr &#8211; Uncover domain shadowing attacks"},"content":{"rendered":"\n<p>At the DNS Community Day organized by DNS-OARC at the APRICOT 2024\/APNIC 57 conference, we released <a href=\"https:\/\/shadowfindr.shreshtait.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ShadowFindr<\/a>, a web tool to detect potential domain shadowing attacks. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/PXL_20240226_080712900.MP_-1024x576.jpg\" alt=\"dns-oarc meeting shadowfindr\" class=\"wp-image-6686\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/PXL_20240226_080712900.MP_-1024x576.jpg 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/PXL_20240226_080712900.MP_-300x169.jpg 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/PXL_20240226_080712900.MP_-768x432.jpg 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/PXL_20240226_080712900.MP_-1536x864.jpg 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/PXL_20240226_080712900.MP_-2048x1152.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-who-is-living-off-your-domain-name\"><strong>Who is living off your domain name?<\/strong> <\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/premium_photo-1691784990083-7b952fd43cd6-1024x766.png\" alt=\"Owl hiding in a tree symbolizing the concept of Who is living off your domain name\" class=\"wp-image-6705\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/premium_photo-1691784990083-7b952fd43cd6-1024x766.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/premium_photo-1691784990083-7b952fd43cd6-300x225.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/premium_photo-1691784990083-7b952fd43cd6-768x575.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/premium_photo-1691784990083-7b952fd43cd6-1536x1150.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/premium_photo-1691784990083-7b952fd43cd6-2048x1533.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>ShadowFindr is a web tool built for domain name registrants that helps identify potential domain shadowing attacks.<\/p>\n\n\n\n<p>We have written about <a href=\"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/\" target=\"_blank\" rel=\"noreferrer noopener\">domain shadowing<\/a> in the past and also uncovered how threat actors leverage the domain shadowing technique and <a href=\"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/\" target=\"_blank\" rel=\"noreferrer noopener\">abuse legitimate domain names under .LK<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-monitoring-dns-records-or-the-dns-zone-using-shadowfindr\"><strong>Monitoring DNS records or the DNS zone using ShadowFindr<\/strong><\/h2>\n\n\n\n<p>In a generic sense, most domain name registrants rely on the registrar&#8217;s DNS infrastructure, which, in most cases, is a web-based DNS control panel for adding\/deleting or modifying DNS records.<\/p>\n\n\n\n<p>Most importantly, the registrar&#8217;s services do not include an email alerting\/notification feature which can inform the registrant if any changes to the DNS zone have occurred.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"800\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/Domain-shadowing-attack2.png\" alt=\"domain shadowing attack\" class=\"wp-image-6679\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/Domain-shadowing-attack2.png 1000w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/Domain-shadowing-attack2-300x240.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/Domain-shadowing-attack2-768x614.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>The other important security feature that most registrars do not have or do not enable by default is 2FA. The lack of 2FA empowers a threat actor to brute-force a registrant&#8217;s login or reuse login details found in data breaches.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-deviations-from-the-parent-zone\"><strong>Deviations from the parent zone<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/kirill-pershin-S81thHi1pz0-unsplash-819x1024.jpg\" alt=\"detection\" class=\"wp-image-6597\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/kirill-pershin-S81thHi1pz0-unsplash-819x1024.jpg 819w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/kirill-pershin-S81thHi1pz0-unsplash-240x300.jpg 240w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/kirill-pershin-S81thHi1pz0-unsplash-768x960.jpg 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/kirill-pershin-S81thHi1pz0-unsplash-1229x1536.jpg 1229w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/kirill-pershin-S81thHi1pz0-unsplash-1639x2048.jpg 1639w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/kirill-pershin-S81thHi1pz0-unsplash-scaled.jpg 2048w\" sizes=\"auto, (max-width: 819px) 100vw, 819px\" \/><\/figure>\n\n\n\n<p>From a detection perspective, ShadowFindr looks for the following deviations,<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Subdomain names pointing to a different Autonomous System Network (ASN) than the parent domain name<\/li>\n\n\n\n<li>Subdomain names pointing to an IP address geolocated to a different country than the parent domain name<\/li>\n\n\n\n<li>Subdomain names pointing at known threat actor network infrastructure<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-shadowfindr-community-access\"><strong>ShadowFindr Community access <\/strong><\/h2>\n\n\n\n<p>A domain name registrant can register and create a free account at <a href=\"https:\/\/shadowfindr.shreshtait.com\/register\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/shadowfindr.shreshtait.com\/register<\/a><\/p>\n\n\n\n<p>The addition of a single domain per account in Shadowfindr is free. Please don&#8217;t hesitate to ask if you need to add additional domain names.<\/p>\n\n\n\n<p>If you encounter a bug or have an idea or suggestion, please get in touch with us at\u00a0<a href=\"mailto:shadowfindr@shreshtait.com\" target=\"_blank\" rel=\"noreferrer noopener\">shadowfindr@shreshtait.com<\/a>. We would love to hear from you!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the DNS Community Day organized by DNS-OARC at the APRICOT 2024\/APNIC 57 conference, we released ShadowFindr, a web tool to detect potential domain shadowing attacks. Who is living off your domain name? ShadowFindr is a web tool built for domain name registrants that helps identify potential domain shadowing attacks. We have written about domain [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6589,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[43,42],"tags":[45,159,160,148,158,157],"class_list":["post-6549","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dns","category-threat-intelligence","tag-dns","tag-domain-registrant","tag-domain-registrar","tag-domain-shadowing","tag-shadowfinder","tag-shadowfindr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Security &amp; Threat Intelligence Blog | Shreshta<\/title>\n<meta name=\"description\" content=\"ShadowFindr is a web tool built for domain name registrants that helps identify potential domain shadowing attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ShadowFindr - Uncover domain shadowing attacks\" \/>\n<meta property=\"og:description\" content=\"ShadowFindr is a web tool built for domain name registrants that helps identify potential domain shadowing attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"DNS Security &amp; Threat Intelligence Blog | Shreshta\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-13T16:07:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-13T16:07:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1706\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Swapneel Patnekar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:site\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Swapneel Patnekar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/03\\\/shadowfindr-uncover-domain-shadowing-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/03\\\/shadowfindr-uncover-domain-shadowing-attacks\\\/\"},\"author\":{\"name\":\"Swapneel Patnekar\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\"},\"headline\":\"ShadowFindr &#8211; Uncover domain shadowing attacks\",\"datePublished\":\"2024-03-13T16:07:29+00:00\",\"dateModified\":\"2024-03-13T16:07:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/03\\\/shadowfindr-uncover-domain-shadowing-attacks\\\/\"},\"wordCount\":322,\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/03\\\/shadowfindr-uncover-domain-shadowing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg\",\"keywords\":[\"dns\",\"domain registrant\",\"domain registrar\",\"domain shadowing\",\"shadowfinder\",\"shadowfindr\"],\"articleSection\":[\"DNS\",\"Threat Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/03\\\/shadowfindr-uncover-domain-shadowing-attacks\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/03\\\/shadowfindr-uncover-domain-shadowing-attacks\\\/\",\"name\":\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/03\\\/shadowfindr-uncover-domain-shadowing-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/03\\\/shadowfindr-uncover-domain-shadowing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg\",\"datePublished\":\"2024-03-13T16:07:29+00:00\",\"dateModified\":\"2024-03-13T16:07:30+00:00\",\"description\":\"ShadowFindr is a web tool built for domain name registrants that helps identify potential domain shadowing attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/03\\\/shadowfindr-uncover-domain-shadowing-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/03\\\/shadowfindr-uncover-domain-shadowing-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/03\\\/shadowfindr-uncover-domain-shadowing-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg\",\"width\":2560,\"height\":1706,\"caption\":\"Owl hiding in a tree symbolizing the concept of Who is living off your domain name\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/03\\\/shadowfindr-uncover-domain-shadowing-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ShadowFindr &#8211; Uncover domain shadowing attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"name\":\"DNS Security &amp; Threat Intelligence Blog | Shreshta\",\"description\":\"DNS Security &amp; Threat Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\",\"name\":\"Shreshta IT Technologies Pvt. Ltd.\",\"alternateName\":\"Shreshta\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"width\":330,\"height\":76,\"caption\":\"Shreshta IT Technologies Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/shreshtait\",\"https:\\\/\\\/infosec.exchange\\\/@shreshta\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/shreshta\\\/\"],\"description\":\"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.\",\"email\":\"sales@shreshtait.com\",\"legalName\":\"Shreshta IT Technologies Pvt. Ltd.\",\"foundingDate\":\"2014-01-22\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"},\"publishingPrinciples\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/blog\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\",\"name\":\"Swapneel Patnekar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"caption\":\"Swapneel Patnekar\"},\"sameAs\":[\"https:\\\/\\\/shreshtait.com\\\/blog\"],\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/author\\\/pswapneel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"ShadowFindr is a web tool built for domain name registrants that helps identify potential domain shadowing attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/","og_locale":"en_US","og_type":"article","og_title":"ShadowFindr - Uncover domain shadowing attacks","og_description":"ShadowFindr is a web tool built for domain name registrants that helps identify potential domain shadowing attacks.","og_url":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/","og_site_name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","article_published_time":"2024-03-13T16:07:29+00:00","article_modified_time":"2024-03-13T16:07:30+00:00","og_image":[{"width":2560,"height":1706,"url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Swapneel Patnekar","twitter_card":"summary_large_image","twitter_creator":"@shreshtait","twitter_site":"@shreshtait","twitter_misc":{"Written by":"Swapneel Patnekar","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/#article","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/"},"author":{"name":"Swapneel Patnekar","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484"},"headline":"ShadowFindr &#8211; Uncover domain shadowing attacks","datePublished":"2024-03-13T16:07:29+00:00","dateModified":"2024-03-13T16:07:30+00:00","mainEntityOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/"},"wordCount":322,"publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg","keywords":["dns","domain registrant","domain registrar","domain shadowing","shadowfinder","shadowfindr"],"articleSection":["DNS","Threat Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/","url":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/","name":"","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg","datePublished":"2024-03-13T16:07:29+00:00","dateModified":"2024-03-13T16:07:30+00:00","description":"ShadowFindr is a web tool built for domain name registrants that helps identify potential domain shadowing attacks.","breadcrumb":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/#primaryimage","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/03\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg","width":2560,"height":1706,"caption":"Owl hiding in a tree symbolizing the concept of Who is living off your domain name"},{"@type":"BreadcrumbList","@id":"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shreshtait.com\/blog\/"},{"@type":"ListItem","position":2,"name":"ShadowFindr &#8211; Uncover domain shadowing attacks"}]},{"@type":"WebSite","@id":"https:\/\/shreshtait.com\/blog\/#website","url":"https:\/\/shreshtait.com\/blog\/","name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"DNS Security &amp; Threat Intelligence","publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shreshtait.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shreshtait.com\/blog\/#organization","name":"Shreshta IT Technologies Pvt. Ltd.","alternateName":"Shreshta","url":"https:\/\/shreshtait.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","width":330,"height":76,"caption":"Shreshta IT Technologies Pvt. Ltd."},"image":{"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/shreshtait","https:\/\/infosec.exchange\/@shreshta","https:\/\/www.linkedin.com\/company\/shreshta\/"],"description":"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.","email":"sales@shreshtait.com","legalName":"Shreshta IT Technologies Pvt. Ltd.","foundingDate":"2014-01-22","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"},"publishingPrinciples":"https:\/\/shreshtait.com\/blog\/blog\/"},{"@type":"Person","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484","name":"Swapneel Patnekar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","caption":"Swapneel Patnekar"},"sameAs":["https:\/\/shreshtait.com\/blog"],"url":"https:\/\/shreshtait.com\/blog\/author\/pswapneel\/"}]}},"_links":{"self":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/6549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/comments?post=6549"}],"version-history":[{"count":57,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/6549\/revisions"}],"predecessor-version":[{"id":6706,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/6549\/revisions\/6706"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media\/6589"}],"wp:attachment":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media?parent=6549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/categories?post=6549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/tags?post=6549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}