Skip to main content

Potential Phishing Search API

Detect potential phishing domains that impersonate your brand by appearing on third-party domains (e.g. adnoc.secure-login.xyz targeting adnoc.com).

warning

OEM API requires special partner access. Contact FullHunt sales to enable OEM capabilities on your account.

Search Potential Phishing Domains

Search for domains impersonating a brand on third-party infrastructure, discovered via Certificate Transparency logs.

HTTP Request

POST https://fullhunt.io/api/v1/oem/potential-phishing/search

Request Body Parameters

ParameterRequiredTypeDescription
queryYesstringBase domain to search for potential phishing domains
query_tagsNoobjectKey-value pairs for client-specific tracking

Example Request

curl -X POST "https://fullhunt.io/api/v1/oem/potential-phishing/search" \
-H "X-API-KEY: xxxx-xxxx-xxxx-xxxxxx" \
-H "Content-Type: application/json" \
-d '{
"query": "adnoc.com",
"query_tags": {
"client_name": "ADNOC",
"workspace": "production"
}
}'

Example Response

{
"base_domain": "adnoc.com",
"total": 3,
"potential_phishing_domains": [
{
"domain": "adnoc.secure-login.xyz",
"base_domain": "adnoc.com",
"type": "PotentialPhishing",
"dns": {
"a": ["192.0.2.45"],
"aaaa": [],
"mx": [],
"ns": ["ns1.registrar.com", "ns2.registrar.com"],
"cname": [],
"txt": [],
"ptr": []
},
"dns_history": [
{
"date": "04-03-2026",
"dns": {
"a": ["192.0.2.45"],
"aaaa": [],
"mx": [],
"ns": ["ns1.registrar.com", "ns2.registrar.com"],
"cname": [],
"txt": [],
"ptr": []
},
"timestamp": 1741052400
}
],
"last_seen": 1741138800,
"date_added": 1741052400
},
{
"domain": "adnoc-login.net",
"base_domain": "adnoc.com",
"type": "PotentialPhishing",
"dns": {
"a": ["198.51.100.88"],
"aaaa": [],
"mx": ["mail.adnoc-login.net"],
"ns": ["dns1.parking.net", "dns2.parking.net"],
"cname": [],
"txt": ["v=spf1 include:_spf.google.com ~all"],
"ptr": []
},
"dns_history": [
{
"date": "01-03-2026",
"dns": {
"a": ["198.51.100.88"],
"aaaa": [],
"mx": ["mail.adnoc-login.net"],
"ns": ["dns1.parking.net", "dns2.parking.net"],
"cname": [],
"txt": ["v=spf1 include:_spf.google.com ~all"],
"ptr": []
},
"timestamp": 1740787200
}
],
"last_seen": 1741138800,
"date_added": 1740787200
},
{
"domain": "my-adnoc.io",
"base_domain": "adnoc.com",
"type": "PotentialPhishing",
"dns": {
"a": ["203.0.113.10"],
"aaaa": [],
"mx": [],
"ns": ["ns1.cloudflare.com", "ns2.cloudflare.com"],
"cname": [],
"txt": [],
"ptr": []
},
"dns_history": [
{
"date": "25-02-2026",
"dns": {
"a": ["203.0.113.10"],
"aaaa": [],
"mx": [],
"ns": ["ns1.cloudflare.com", "ns2.cloudflare.com"],
"cname": [],
"txt": [],
"ptr": []
},
"timestamp": 1740441600
}
],
"last_seen": 1741138800,
"date_added": 1740441600
}
]
}

Response Fields

FieldTypeDescription
base_domainstringThe queried base domain
totalintegerTotal number of potential phishing domains found
potential_phishing_domainsarrayArray of potential phishing domain objects

Potential Phishing Domain Object Fields

FieldTypeDescription
domainstringThe phishing domain discovered
base_domainstringThe original/legitimate domain being impersonated
typestringType of threat (always "PotentialPhishing")
dnsobjectCurrent DNS records for the phishing domain
dns.aarrayIPv4 addresses
dns.aaaaarrayIPv6 addresses
dns.mxarrayMail server records
dns.nsarrayName server records
dns.cnamearrayCanonical name records
dns.txtarrayText records
dns.ptrarrayPointer records
dns_historyarrayHistorical DNS snapshots (only recorded when DNS changes)
dns_history[].datestringDate of the snapshot (DD-MM-YYYY)
dns_history[].dnsobjectDNS records at that point in time
dns_history[].timestampinteger (Unix timestamp)Epoch time of the snapshot
last_seeninteger (Unix timestamp)Most recent verification timestamp
date_addedinteger (Unix timestamp)When domain was first discovered

How It Differs from Typosquatting

AspectTyposquattingPotential Phishing
DetectionMisspellings of the domain (e.g. adnco.com)Brand name on third-party domains (e.g. adnoc.secure-login.xyz)
Data SourceDomain permutation algorithmsCertificate Transparency log keyword search
Domain OwnerAttacker registers a look-alike domainAttacker uses the brand name as a subdomain or keyword on their own domain

Use Cases

Brand Impersonation Detection

  • Find domains using your brand name on unrelated infrastructure
  • Detect credential harvesting pages (e.g. brand.secure-login.xyz)
  • Identify phishing campaigns targeting your customers or employees

Threat Intelligence

  • Track attacker infrastructure hosting brand impersonation
  • Correlate phishing domains with active campaigns
  • Monitor DNS changes over time via dns_history to detect infrastructure shifts

Partner Integration

  • Provide phishing domain monitoring as a service to clients
  • Build brand protection dashboards combining typosquatting and phishing data
  • Automate takedown workflows when new phishing domains appear

DNS History Tracking

The dns_history array provides a timeline of DNS changes for each phishing domain. A new entry is only added when DNS records change from the previous snapshot, making it easy to track infrastructure changes over time.

Query Tags for Tracking

Use the query_tags parameter to track searches by client or context:

{
"query_tags": {
"client_id": "client_123",
"client_name": "ADNOC Group",
"workspace": "production",
"scan_id": "scan_789"
}
}

Rate Limiting

OEM Potential Phishing Search API has custom rate limits based on your partner agreement:

  • Negotiated limits based on usage requirements
  • Burst capacity for high-volume periods
  • Priority processing for partner requests

Error Handling

The API returns standard HTTP status codes:

Status CodeDescription
200Success
400Bad Request - Invalid parameters
401Unauthorized - Invalid API key
403Forbidden - OEM access not enabled or credit exhausted
429Rate limit exceeded
500Internal server error

Example Error Response

{
"error": "Missing required parameter: 'query'"
}

Triggering Scans

You can trigger an on-demand scan to discover potential phishing domains:

Use the On-Demand Scan API:

curl -X POST "https://fullhunt.io/api/v1/oem/on-demand-scan" \
-H "X-API-KEY: xxxx-xxxx-xxxx-xxxxxx" \
-H "Content-Type: application/json" \
-d '{
"type": "domain",
"target": "adnoc.com"
}'

Best Practices

  1. Trigger Scans First: Use on-demand scan API to ensure fresh data for new domains
  2. Combine with Typosquatting: Use both APIs together for comprehensive brand protection
  3. Monitor DNS History: Review dns_history to detect infrastructure changes and campaign shifts
  4. Automated Alerts: Set up notifications when new phishing domains are discovered
  5. Takedown Process: Establish procedures for reporting/taking down malicious domains
  6. MX Record Analysis: Phishing domains with MX records may be used for email-based attacks