Please note that it is strictly advised not to scan any targets without proper permission and
authorization; any misuse of the scanning tool is the sole responsibility of the user, and
they may be held accountable for any potential legal repercussions that arise from
unauthorized scanning activities.Terms of
Service
Context
Cyber Squatting
| Website Vulnerability Scanner
Find out if a domain has been impersonated or squatted.
Input
Operation
Result
Remaining Daily Requests 50 (guest user)
Request Timings
Target Flags
API Overview | Included with all paid subscriptions
The prompt is the main searchterm provided to the tool. This needs to be in a
format required by the tool otherwise an error may be returned. For example some tools may
require URLs while others may require IP addresses.
Some options may be required while others are optional. If there are no options, an empty
object should be provided.
The default API key is provided as an example only. This will not work in your own
applications. Register for a free account to get an API key.
Example CURL Request
Data
Data Types
Modules
Cyber Squatting
Token cost: 10
Enter a domain name to find out if it has been impersonated or squatted.