🆔 Homograph Attack Defender

Learn to spot Internationalized Domain Name (IDN) spoofing

What is a Homograph Attack?

Homograph attacks (also called Homoglyph attacks) exploit visually similar characters from different scripts (like Latin vs. Cyrillic or Greek) to create deceptive domain names.

Attackers register domains using Punycode (prefixed with xn--). To the computer, xn--80ak6aa92e.com is a unique address, but to your browser, it renders as apple.com (using Cyrillic characters).

Real World Example:
Visual: apple.com (Cyrillic)
Actual: xn--80ak6aa92e.com
Used in a famous 2017 Proof-of-Concept to bypass browser security.

Common Substitution Types

Visual Spoof Legitimate Technique
micrоsоft.com microsoft.com Cyrillic 'о' (U+043E) instead of Latin 'o'
paypaӏ.com paypal.com Cyrillic 'ӏ' (U+04CF) instead of Latin 'l'
tωitter.com twitter.com Greek 'ω' instead of 'w'
adoḅe.com adobe.com Latin 'ḅ' (dotted) instead of 'b'

🔍 Domain Inspector

Paste a suspicious domain below. We will analyze the characters to see if they are standard Latin (ASCII) or potential homoglyphs.

Try these examples from the dataset:

Score: 0 1 / 5

Is this domain SAFE or FAKE?

Look closely at the characters.

...