Protect your brand from lookalike domain attacks.

12 ICANN scripts

Spoofing isn't limited to Latin. d0ma1n scans across all 12 ICANN-approved IDN scripts.

Latin
Latin
Кириллица
Cyrillic
Ελληνικά
Greek
العربية
Arabic
漢字
Han
한글
Hangul
カタカナ
Katakana
ひらがな
Hiragana
देवनागरी
Devanagari
ไทย
Thai
ქართული
Georgian
Հայերեն
Armenian

What makes d0ma1n different

1,397 scored pairs

Not a static homoglyph table. Every confusable pair is SSIM-scored across 230 fonts, with p95 and max metrics. 793 pairs are novel discoveries beyond TR39.

12 scripts

Latin, Cyrillic, Greek, Arabic, Han, Hangul, Katakana, Hiragana, Devanagari, Thai, Georgian, Armenian. Most tools only check Latin lookalikes.

Font-aware

Visual similarity depends on the font. A substitution that is invisible in Arial may be obvious in Georgia. d0ma1n finds the worst-case font for each variant.

At a glance

Inspired by dnstwist. Built on measured visual similarity instead of static tables.

Capability
Confusable pairs1,397 SSIM-scored (793 novel, beyond TR39)
Scripts12 ICANN-approved IDN scripts, bidirectional
ScoringContinuous 0 to 1 (p95 and max SSIM)
Font awarenessBest-font lookup across 74 fonts
DNS resolutionA, AAAA, MX, NS with threat classification
IDNA filteringOnly PVALID characters (registrable domains)
Reverse lookupIdentify what a suspicious domain impersonates
Runtime dependencies1 (namespace-guard)

How it works

Three open-source projects in a pipeline.

confusable-vision

Renders 230 fonts, computes SSIM similarity for every Unicode pair. Produces scored confusable maps.

namespace-guard

Ships the maps as runtime data. Provides skeleton(), areConfusable(), and cross-script detection.

d0ma1n

Inverts the maps, generates domain variants via k-edit enumeration, scores them, resolves DNS.

Open source

Built in the open. MIT licensed.