Ask HN: Why buy domains and 301 redirect them to me?
- Attempting to use your legitimate content and services to improve the SEO rank of other domains (even unrelated ones). This can usually be checked by looking for a sitemap.xml, there will be pages not redirected to your site that contain pages of links.
- Closely following the above, the pages may not be links to other sites but might be hosting phishing pages for other services unrelated to yours. The redirect here acts as a bluff for casual inspection of the domain. You won't see page entries in a sitemap.xml file for these ones.
- Attempting to "age" a domain. Not many talk about this option, but new domains are a red flag to a lot of automated security processes. When purchasing a domain and giving it a history associated with a legitimate service they make the domain look less suspicious for future malicious use.
- Preparation for a targeted campaign. This is pretty unlikely, you need to be really worth a dedicated long term campaign effort specifically against you or your company. If you're doing controversial/novel research, are managing millions of dollars, performing a service a state actor would object to, or have high profile clientele then maybe you fall into this category. These are patient campaigns and want to make the domain "feel normal and official". They won't do anything public with the domain such as SEO tweaking or link spam, they'll use these domains only for specific targeted one-off low-noise attacks. They're relying on staff to see that the domain has been connected to your service for years and is likely just a domain someone in marketing purchased and forgot about. This is exceptionally rare.
I think this was a common attack vector around then, but is no longer common.
The Cloudflare redirect likely has GoDaddy underneath, based on what’s visible at myEXAMPLE.com/lander and others.
Half of the domains are set for Outlook Mail, the other for Google Mail which points to a potential email game.
It doesn’t make things safer that your brand name is a top-400 frequency word in one of the European languages. Not owning your .com and having a dozen businesses with similar names just compounds the risk.
What to do really depends on the specifics of your case, including trademark and competition factors. If you’re stuck, feel free to ping me at aghackernews [at] gmail.
There was a humanitarian charity I've donated to, and I saw people erroneously linking to the wrong URLs when spreading news of it. (Say, `foobar.org` and `boofar.com` when the charity is at `boofar.org`.)
So, I just bought the URLs and had them redirect to the correct URL, before a bad actor could snap them up.
They might be trying to create toxic back links to their domains and if those domains 301 to your domain, I believe this can negatively impact the SEO of your domain (from what I read). If so you can try to disavow them https://support.google.com/webmasters/answer/2648487?hl=en
They'll then send out an email campaign with a From: address in the counterfeit domain (which will have valid SPF/DKIM/whatever), a subject like "Example.com: You've been invited to join a project!", quickly-come-see-this-secret-stuff body copy, and a call-to-action button linked to that URL.
The page hosted on the URL will have your branding and everything, and collect a bunch of personal information and/or access credentials for the scammers.
Taking down this stuff is tedious, but you can try -- least you can do for now is display a prominent 'this is not an authorized example.com domain' warning for inbound visits from these redirects, create a public Knowledge Base-like article warning about this abuse as well (making very clear this has nothing to do with you), and block the domains involved on your inbound mail server.
Silver lining: apparently your SaaS is successful enough to be used as a lure for scammers. Congrats?
This is preferable rather than returning 404, 403, or warning users something fishy is going on - since anything you return from your site will have browsers and crawlers complaining about your site, and your URL/contents might suffer penalties or deindexing as a result.
File a DMCA with the registrar and the hosting provider.
Just curious, seems like something we should all start monitoring for.
They may also represent you to real life businesses for invoice scams or credit.
Rare but possible scenarios worth considering.
I posted about it at the time, but no one seemed to be able to replicate it:
https://x.com/jfozonx/status/1570710776540958723
Always wondered how much traffic those domains were accumulating. Even though it was an edge case, it must've been quite a lot in aggregate.
I'm guessing it will look normal but it could provide some insights if something weird is there.
Check this: https://github.com/kgretzky/evilginx2
I have done this once in the past, for a sort of community project. the project was at example.org and I had a VPS with a free domain I didn't use, so I had the example.[something] pointed there for a couple years. Basically just white-hat domain squatting it so no one else snags it up.
It's been a while, and IANAL - but I've seen both domain resellers and registrars cave pretty quickly when contacted with "that name very obviously infringes on our trademark".
A somewhat innocent reason could be that someone sent a newsletter email or shared a link to your site, but mistyped the URL, so to save their users from getting NXDOMAIN errors l, or even worse, someone registering it with illintentions, they registered and 301 redirected to you.
------ SEO Abuse:
Use your legitimate site to boost the SEO rank of unrelated domains. Create toxic backlinks that harm your domain’s SEO ranking if not properly disavowed.
----- Phishing Campaigns:
Send emails with their domains (e.g., fake password reset or invite emails) claiming to be you, redirecting users to phishing pages masquerading as your brand.
Serve phishing content to users based on conditions such as geography, user agent, or time of day.
----- Domain Aging:
"Age" their domain by associating it with your legitimate service to make it appear trustworthy for future malicious activities. Targeted Malware:
Use redirects to detect vulnerable users and deliver malware or drive-by attacks to those targets while serving legitimate content to others. Regional Phishing or Malware Delivery:
Redirect normal traffic to your site while targeting specific regions for phishing or malware, avoiding detection for longer periods.
----- Hijacking Search Results:
Build up search engine traffic for their domains by associating them with your brand and later weaponize the domains (e.g., for phishing or fraud). Affiliate Fraud:
Redirect traffic with an affiliate ID (if you use affiliate links), attempting to claim commissions fraudulently. Brand Impersonation:
Use domains similar to your brand to impersonate your service, potentially harming your reputation.
----- Extortion/Domain Ransom:
Build traffic or search relevance on their domains and later attempt to extort money from you by offering to stop the redirect or sell the domain.
----- Invoice Scams:
Represent your service fraudulently to businesses for invoice scams or credit fraud.
----- Bypass Sanity Checks:
Use 301 redirects to bypass user sanity checks, tricking users into believing they are visiting legitimate sites.
---- Traffic Monetization:
Use ad-infested parking pages for a fraction of the traffic and redirect the rest to your site to generate revenue.
----- Reputation Damage:
Cause your brand to be associated with scam or phishing domains, which can harm public perception and trust.
----- Legal Liability:
Misuse of your brand or domain to commit fraud could lead to potential legal complications for you.
----- False Phishing Reports:
Cause false flags in phishing reports, harming your brand credibility and delaying the takedown of malicious domains. Hidden Routes for Malicious Content:
Redirect general traffic to you while hosting specific malicious routes (e.g., URLs hosting phishing or malware).
----- Impersonation via Emails:
Send emails claiming to be your service, and when users visit the domain, they see your page after a redirect, adding legitimacy to the scam.
----- Scam Awareness Manipulation:
Target your traffic by hosting fraudulent educational content or warnings related to your domain to sow distrust.
-------------------------- Mitigation Strategies: --------------------------
• Monitor Backlinks: Regularly check backlinks and disavow toxic links using Google’s Disavow Links Tool.
• HTTP Referrer Checks: Implement referrer or origin header-based redirects to flag and warn users arriving via fraudulent domains.
• Warn Users: Create a visible warning for users redirected from suspicious domains.
• Trademark/IP Enforcement: Leverage trademark protections to take action against impersonating domains.
• Manual Domain Actions: Periodically check for indexed pages and investigate potential abuses of similar or related domains.
If they want to sell you sth, or scam, they won't do 301, because after 301 the juice power will gradually move to your domain, and its pointless to do this before any scams and sales.
if the domains being forwarded have had penalties it could leak into your domain SEO value
could also be a mistake :)
First and foremost, guide visitors with a popup alert or a banner that you only conduct legitimate business through example.com.
Did you buy used/old/expired domain? Any patterns you can see or a random increase in traffic out of nowhere? What about your competitors?
A 301 redirect isn't a bad thing unless someone has the knowledge to turn it into something bad.
If you know that is happening with HTTP you can redirect those requests, based upon origin, to a honeypot of your choosing. It’s free traffic you didn’t have to work for to use as you wish without disruption to your business requirements. You can use that traffic to experiment with new features under experimental branding, AB testing, and more.
Step 2: offer to sell them to you for some inflated price
Step 3: make your life hell if you dont pay
Expired domains and Domains on the marketplace, with hundreds or thousands of “backlinks” to them, are valuable. In the listing you may see something like “20000 back links.” And those links are usually worthless , spam, and will vanish as soon as you buy. But you can find domains that have real backlinks. TEN backlinks from reputable websites are more valuable than a thousand spam BLs.
You used to be able to buy and run software , “backlinks explorer” to investigate everyone who links to a domain you’re thinking about buying. And you can also research a “20000 backlinks” claim to see if this is just someone spamming that domain all over blogger and forums.
A good domain to buy will have legit backlinks from real websites that the website linked on purpose. If it’s been spammed thousands of times for a “5000 backlinks claim” , expect google to punish it!
Because if you 301 them to your site, google et al assume you’re the legitimate successor to that website and people mean to link to you.
So you come up higher in search.
I’ve used this to be the first or second result on google. And certainly on the first page of results.
It overcomes downranking for being a new domain nobody links to.
Google has its own criteria for evaluating whether your page is spam or a scam, and whether you’re abusing this to promote spam or a scam.
I have a trio of ancient highly ranked domains that I forward to a new page for about a year.
They’ll hit page one on google within a week or two or three.
After I remove the 301s or recycle those domains, the pages usually still come up within the first page of results afterwards.
Before you get too horrified here, I did this to bury a “competitor” who had registered a similar domain name, stolen my entire repo and website from a disgruntled employee, copied all my software and copied my webpage word for word trying to drum up business on my IP. The whole time they mocked me in email about stealing my customers and putting me out of business.
It worked. (Sort of. If you hire them they don’t actually have any idea how to do what I do.)
I did not do this to scam or phish or what have you. I just did this to bump them from #1 on google. Which they got by incorporating with a similar business name and registering with a similar URL.
They did ultimately manage to shut that business down and disrupt it after years of this and I moved on because I have other talents and this venture wasn’t profitable enough to deal with this entity kneecapping me for years and years.
But on my way out, I forwarded all of those domains to a reasonable and legitimate website that’s in the same line of work, resulting in them now dominating the other site in search. So I walked away and used this trick one last time to at least ensure someone searching for this subject would end up in some safe and reasonable hands.
What’s my point in sharing this?
It’s that the other website has no idea I did this, and has no control over it. You might see this and assume the worst about the other website.
someone could be doing this to manipulate SEO or search results over sites they don’t even own. For reasons that might (?) make sense or be well intended.
and for reasons that don’t, or might even be malicious.
* MULTIPLE edits for clarification
This is less true than it used to be, but people still do it.