Home / Industry

Down the DNS Funnel and into the Funnull Infrastructure

The Federal Bureau of Investigation (FBI) issued a FLASH report to disseminate indicators of compromise (IoCs) for the Funnull infrastructure that threat actors used to manage domains related to cryptocurrency investment fraud scams between October 2023 and April 2025. The report provided links to two lists.

The first list contained 549 Funnull CNAMEs from which we extracted 19 unique domains. The second list, meanwhile, contained 332,696 URLs believed to be part of the Funnull infrastructure, totaling 333,245 web properties, from which we extracted 176,637 root domains. Combining the two lists, we had a total of 176,656 root domains for analysis.

WhoisXML API ran the dataset through several of our tools, which allowed us to gather these findings for the first part of our analysis:

  • 176,656 root domains extracted from the FBI’s IoC lists
  • 101,123 net new typosquatting domains uncovered, bringing the total number of domains to analyze to 277,779
  • 82,261 out of the 277,779 domains dubbed “likely to turn malicious” as soon as they were created
  • Sample DNS traffic data from the Internet Abuse Signal Collective (IASC) collected for the 277,779 domains recorded 22,772 unique client IP addresses querying 1,062 distinct domains between 6 May and 4 June 2025 through 189,640 DNS requests

We then paid closer attention to the 101,123 net new typosquatting domains, along with the 44,834 FBI domains these were derived from, and identified the following findings for the latter part of our analysis:

  • Hong Kong was the top geolocation country of the resolving IP addresses while the top ISP varied for the IPs of the net new typosquatting domains versus FBI domains.
  • The U.S. was the top current registrant country while 146 was their top IANA ID.
  • The U.S. was the top historical registrant country (i.e., when the domains were first created) while the top historical IANA ID varied for the net new typosquatting domains versus FBI domains.

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Hunting for Look-Alike Domains

We began our analysis by uncovering more domains that could be part of the Funnull infrastructure, specifically by looking for look-alikes via the Typosquatting Data Feed. Using the combined list of 176,656 root domains from the FBI lists as search terms, we obtained 101,123 net new typosquatting domains. That brought our total dataset to 277,779 domains.

Examining the Combined List of FBI and Typosquatting Domains

Determining Which Domains Were Likely to Turn Malicious

After expanding our dataset, we sought to determine if any of the 277,779 domains were deemed likely to turn malicious as soon as they were created. Our First Watch Malicious Domains Data Feed searches provided us with 82,261 matches from January 2024 to June 2025, which makes up nearly 30% of the total number. Take a look at the domain volume breakdown by month below.

Uncovering Active DNS Connections

Using sample DNS traffic data our researchers obtained from the IASC, we further analyzed the 277,779 domains. The sample data revealed that 22,772 unique client IP addresses queried 1,062 distinct domains between 6 May and 4 June 2025 through a total of 189,640 DNS requests.

We further examined the DNS traffic data to determine the top 10 netblocks Autonomous System (AS) countries of the client IP addresses and found they were the U.S., the E.U., Germany, China, Russia, the Netherlands, France, South Africa, Turkey, and the U.K. Take a look at the breakdown below.

We also identified the top 10 netblocks AS names pertaining to the providers of the client IP addresses. CLOUDFLARENET topped the list, followed by TEMPEST, TEMPEST-HOSTING, PONYNET-07, COGENT-A, CLOUDFLARE-EU, PONYNET, GLH, GOODLEAF-HD, and CLOUDFLARENET-EU. Take a look at the details below.

Digging Deeper into the Typosquatting Domains

Our search for typosquatting domains, including those that were already part of the FBI lists, actually turned up 145,957 domains in all, three for the FBI CNAMEs list and 145,954 for the FBI infrastructure-related subdomains and domains list.

More specifically, 44,834 of the 176,656 root domains extracted from the FBI’s IoC lists were used with domain clustering techniques to identify multiple groups of similar-looking domains with matching registration dates, resulting in the discovery of 101,123 net new typosquatting domains.

To illustrate, let us take a look at an extract sample from our Typosquatting Data Feed, alongside some enrichments, specifically a snippet showing data points for group number 51 comprising 176 domains spotted on 22 May 2024.

As shown, the 14 sample typosquatting domains resembled the domain 67639[.]cz from the FBI’s infrastructure-related domains list in that they all began with 6, comprised five random numbers, and sported new gTLD extensions. Many of them also shared the FBI domain’s registrant country—the U.S.—at the time they were first created based on data gleaned from WHOIS History API and their current WHOIS record details.

Moving on with our analysis of the 145,957 domains, a closer look at their creation dates showed that a majority, 98,578 to be exact, were created in 2024. Altogether, the domains were created between 2021 and 2025. Take a look at the breakdown below.

We also scrutinized the domains in terms of TLD extension and found that a majority, 59,207 to be exact, sported the .com gTLD. Eight of the other TLDs were gTLDs, namely, .vip, .cc, .top, .loan, .app, .co, .xyz, and .net while one was the .cn ccTLD. Take a look at the details below.

We then sought to dig even deeper into the 145,957 domains’ resolving IP addresses and current and historical information in a bid to find overlaps between the domains on the FBI lists and those obtained from Typosquatting Data Feed.

IP Origins and Service Providers

The data we collated from Bulk IP Geolocation Lookup revealed that the top 10 geolocation countries for the combined list of 145,957 domains were Hong Kong, the U.S., the Philippines, Japan, Singapore, China, Luxembourg, Taiwan, Germany, and Ireland. All in all, they were geolocated in 45 countries. Take a look at the detailed breakdown below.

More specifically, 18,255 of the IP addresses of the 44,834 FBI domains had geolocation countries on record. They were spread across 14 countries led by Hong Kong, which accounted for 11,507 of the resolving IP addresses. The rest of the top 10 countries were the U.S., the Philippines, Japan, Singapore, China, France, Germany, Taiwan, and India.

Meanwhile, 38,363 of the IP addresses of the 101,123 net new typosquatting domains had geolocation country information. They were split among 45 countries led by Hong Kong, which accounted for 18,332 of the resolving IP addresses. The rest of the top 10 countries were the U.S., Japan, Singapore, China, Luxembourg, Taiwan, Germany, Ireland, and Malaysia.

GEOLOCATION COUNTRYFBI DOMAINSALL DOMAINSNET NEW TYPOSQUATTING DOMAINS
Hong Kong1st1st1st
U.S.2nd2nd2nd
Philippines3rd3rd
Japan4th4th3rd
Singapore5th5th4th
China6th6th5th
Luxembourg7th6th
Taiwan9th8th7th
Germany8th9th8th
Ireland10th9th

A comparison of the top 10 geolocation countries for the FBI and net new typosquatting domains showed a 70% overlap. Both lists had seven countries in common. Take a look at the details below.

Looking at the ISPs, we discovered that the top 10 were Amazon, Cloudie, Dimension Network, Cloudflare, BGP Network, Spartan Host, Cogent Communications, Simcentric Solutions, CNSERVERS, and Microsoft. The domains’ resolving IP addresses were administered by 192 ISPs. Take a look at the detailed breakdown below.

More specifically, the top 10 ISPs for the FBI domains were Cloudie, Amazon, Spartan Host, BGP Network, Cloudflare, Dimension Network, DXTL, Microsoft, CNSERVERS, and Alibaba and MultaCOM that tied in tenth place. The domains’ resolving IP addresses were administered by 53 ISPs.

Meanwhile, the top 10 ISPs for the net new typosquatting domains were Dimension Network, Amazon, Cloudflare, Cogent Communications, Simcentric Solutions, CNSERVERS, Cloudie, BGP Network, Microsoft, and OWS. The domains’ resolving IP addresses were administered by 192 ISPs.

ISPFBI DOMAINSALL DOMAINSNET NEW TYPOSQUATTING DOMAINS
Amazon2nd1st2nd
Cloudie1st2nd7th
Dimension Network6th3rd1st
Cloudflare5th4th3rd
BGP Network4th5th8th
Spartan Host3rd6th
Cogent Communications7th4th
Simcentric Solutions8th5th
CNSERVERS9th9th6th
Microsoft8th10th9th

A comparison of the top 10 ISPs for the FBI and net new typosquatting domains showed a 70% overlap. Both lists had seven ISPs in common. Take a look at the details below.

Current Domain Registrant Countries and Registrars

The data we collated from Bulk WHOIS API revealed that the top 10 registrant countries for the combined list of 145,957 domains were the U.S., China, the Philippines, Japan, Iceland, Hong Kong, Cambodia, Thailand, Malaysia, and Bulgaria. All in all, they were registered in 70 countries. Take a look at the detailed breakdown below.

More specifically, 23,342 of the 44,834 FBI domains had registrant countries on record. They were spread across 28 countries led by the U.S., which accounted for 15,799 domains. The rest of the top 10 registrant countries were China, the Philippines, Hong Kong, Cambodia, Thailand, Iceland, Malaysia, the Czech Republic, and Canada.

Meanwhile, 40,947 of the 101,123 net new typosquatting domains had registrant country information. They were split among 69 countries led by the U.S., which accounted for 29,373 domains. The rest of the top 10 registrant countries were China, Japan, the Philippines, Iceland, Hong Kong, Cambodia, Bulgaria, Senegal, and Thailand.

CURRENT REGISTRANT COUNTRYFBI DOMAINSALL DOMAINSNET NEW TYPOSQUATTING DOMAINS
U.S.1st1st1st
China2nd2nd2nd
Philippines3rd3rd4th
Japan4th3rd
Iceland7th5th5th
Hong Kong4th6th6th
Cambodia5th7th7th
Thailand6th8th10th
Malaysia8th9th
Bulgaria10th8th

A comparison of the top 10 registrant countries for the FBI and net new typosquatting domains showed a 70% overlap. Both lists had seven countries in common. Take a look at the details below.

Next, we looked into all the domains’ current registrar Internet Assigned Numbers Authority (IANA) IDs and discovered that the top 10 were 146, 472, 1923, 625, 1479, 3863, 1861, 49, 1556, and 3862. We found 185 unique IDs in all. Take a look at the detailed breakdown below.

The top 10 current IANA IDs for the FBI domains, on the other hand, were 146, 625, 1923, 1479, 3863, 472, 1861, 460, 1491, and 1068. We uncovered 46 unique IDs in all.

Finally, the top 10 current IANA IDs for the net new typosquatting domains were 146, 472, 1923, 49, 1556, 1479, 1861, 625, 3862, and 1068. We found 182 IDs in all.

CURRENT IANA IDFBI DOMAINSALL DOMAINSNET NEW TYPOSQUATTING DOMAINS
1461st1st1st
4726th2nd2nd
19233rd3rd3rd
6252nd4th8th
14794th5th6th
38635th6th
18617th7th7th
498th4th
15569th5th
386210th9th

A comparison of the top 10 current registrar IANA IDs for the FBI and net new typosquatting domains showed a 60% overlap. Both lists had six IANA IDs in common. Take a look at the details below.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix