{"id":12846,"date":"2026-01-20T07:55:05","date_gmt":"2026-01-20T15:55:05","guid":{"rendered":"https:\/\/www.infoblox.com\/blog\/?p=12846"},"modified":"2026-01-19T08:21:30","modified_gmt":"2026-01-19T16:21:30","slug":"hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/","title":{"rendered":"Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets"},"content":{"rendered":"<p><strong>Lookalike domains<\/strong> are internet domain names that are deliberately made to look very similar to a legitimate, trusted domain\u2014often with the goal of deceiving users. Examples include: \u201ctacobe11.com\u201d versus \u201ctacobell.com\u201d, \u201clogin-outlook.com\u201d versus \u201clogin.outlook.com\u201d or \u201cinfoblocks.com\u201d versus \u201cinfoblox.com\u201d. They are a common tactic for many types of threats on the internet. These can include scams, credential harvesting, phishing attacks or even for use as innocuous-looking command-and-control (C2) domains.<\/p>\n<p>Infoblox uses many algorithms to detect lookalikes. One challenge in finding lookalikes is compiling a list of target domains that could be used against our customers. We can compile these using various methods, such as creating top queried domain lists, soliciting customer input or even evaluating non-resolved domains for common typos.<\/p>\n<p>However, this list will be far from comprehensive as we may leave the less queried domain on any of our lists. In addition, requiring each new domain to be evaluated against the entire growing target set will slow down processing.<\/p>\n<p>Recently, data scientists at Infoblox Threat Intel decided to prompt a large language model (LLM) to determine the likelihood of a given domain and, if so, what were the most likely target domains. With frontier-level LLMs, the results for the popular domains both for intentional lookalikes and non-lookalikes were very accurate, generally at an accuracy of 91 percent or greater. However, Infoblox takes false positives seriously as they can cause outages, and overload analysts with more alerts.<\/p>\n<p>As we investigated further\u2014particularly when identifying additional lookalikes at the tail end of the possible variations\u2014we found the process to be prone to errors. In fact, target lists could become completely inaccurate. For instance, the benign domain \u201cnetgeek.com\u201d was incorrectly considered a lookalike of \u201cnetgear.com\u201d or \u201cgeeksquad.com\u201d. Careful prompt engineering\u2014including chain-of-thought and reflection techniques\u2014helped addressing these issues. Sometimes, though, the best way to tame hallucination is to go back to traditional methods.<\/p>\n<h3>Here additional steps how Infoblox reduces false positives for improved \u201clookalike domain\u201d detections<\/h3>\n<p><strong>Step 1<\/strong><\/p>\n<p>We use our old algorithms to determine if \u201cnetgeek.com\u201d is a lookalike in the target set of \u201cnetgear.com\u201d or \u201cgeeksquad.com\u201d. Our modified <a href=\"https:\/\/en.wikipedia.org\/wiki\/Edit_distance\" target=\"_blank\"><strong>edit distance<\/strong><\/a> algorithm did quite well disambiguating both targets from \u201cnetgeek.com\u201d. But let\u2019s consider another benign example, \u201camzn.com\u201d, the LLM helpfully suggested \u201camazon.com\u201d and here our modified edit distance algorithm still scored \u201camzn.com\u201d close to \u201camazon.com\u201d. This might be a problem if we didn\u2019t consider additional context that amzn.com is owned by Amazon, Inc and as such really isn\u2019t something we need to alert or block on.<\/p>\n<p><strong>Step 2<\/strong><\/p>\n<p>We can look up the registration and SSL\/TLS certificate information about both \u201camzn.com\u201d and \u201camazon.com\u201d. Here we see \u201camzn.com\u201d and \u201camazon.com\u201d have the same name servers, registrars and a common SSL certificate, so we can be confident \u201camzn.com\u201d is a domain owned by the same entity as \u201camazon.com\u201d. This means while \u201camzn.com\u201d does indeed look like \u201camazon.com\u201d there would be no need to report on the domain.<\/p>\n<p>Infoblox is committed to responsible AI. Part of this process is not taking data generated at face value. By employing these secondary checks, we trust but verify all predictions.<\/p>\n<p><strong>Recent Examples<\/strong><\/p>\n<p>So far, we have discussed how we avoid hallucinations and potentially misclassify a domain as a lookalike. Now, let\u2019s see how this might help defend against various lookalike threats. In the following table, we give some recent examples of lookalikes we\u2019ve found along with the explanations the LLM generated.<\/p>\n<table>\n<thead>\n<tr>\n<th>Domain<\/th>\n<th>Target<\/th>\n<th>Confidence Score (out of 10)<\/th>\n<th>Explanation<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>infobiox.com<\/td>\n<td>infoblox.com<\/td>\n<td>8<\/td>\n<td>This may be a suffix-based lookalike, attempting to get a user to try to log in to an Infoblox portal, but the \u201cx\u201d instead of \u201cl\u201d could be a typo or a legitimate variation.<\/td>\n<\/tr>\n<tr>\n<td>paioaltonetworks.tech<\/td>\n<td>paloaltonetworks.com<\/td>\n<td>6<\/td>\n<td>The domain \u201cpaioaltonetworks.tech\u201d appears to be a typo or substitution attempt, with \u201cpaio\u201d being similar to \u201cpalo\u201d, which is a well-known cybersecurity company. However, the use of \u201c.tech\u201d instead of \u201c.com\u201d and the slight misspelling may indicate a legitimate domain or a non-malicious typo.<\/td>\n<\/tr>\n<tr>\n<td>icloudservi.me<\/td>\n<td>icloud.com<\/td>\n<td>9<\/td>\n<td>This domain appears to be a lookalike of \u201cicloud.com\u201d with a typo (\u201cservi\u201d instead of \u201cservice\u201d) and a different top-level domain (\u201c.me\u201d), which might be an attempt to deceive users into thinking it\u2019s related to Apple\u2019s iCloud services.<\/td>\n<\/tr>\n<tr>\n<td>maps-iphone.cloud<\/td>\n<td>apple.com<\/td>\n<td>9<\/td>\n<td>The domain \u201cmaps-iphone.cloud\u201d could be a lookalike of Apple\u2019s services by combining \u201cmaps\u201d (a service offered by Apple) with \u201ciphone\u201d (a product by Apple) and a trendy top-level domain (\u201c.cloud\u201d), potentially to target iPhone users.<\/td>\n<\/tr>\n<tr>\n<td>go\u00f3gl\u00e9.com<\/td>\n<td>google.com<\/td>\n<td>9<\/td>\n<td>The domain contains Unicode characters (\u201c\u00f3\u201d and \u201c\u00e9\u201d) that are visually similar to the characters in the well-known domain \u201cgoogle.com\u201d, which could be an attempt to deceive users.<\/td>\n<\/tr>\n<tr>\n<td>onedrive-micrasoft.com<\/td>\n<td>microsoft.com<\/td>\n<td>8<\/td>\n<td>This may be a suffix-based lookalike, with a typographical error in \u201cmicrasoft\u201d instead of \u201cmicrosoft\u201d, which is a well-known company and product.<\/td>\n<\/tr>\n<tr>\n<td>coinbase-invoice.com<\/td>\n<td>coinbase.com<\/td>\n<td>8<\/td>\n<td>This may be a suffix-based lookalike, attempting to deceive users into thinking it\u2019s an official invoice from Coinbase, a well-known cryptocurrency exchange.<\/td>\n<\/tr>\n<tr>\n<td>login-wellsfargo.com<\/td>\n<td>wellsfargo.com<\/td>\n<td>9<\/td>\n<td>This may be a prefix-based lookalike, attempting to get a user to try to log in to a fake Wells Fargo portal.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Recently, Infoblox Threat Intel did a study on <a href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/\" ><strong>risks related to parked domains<\/strong><\/a> and utilized these methods to better understand which legitimate domains the actors were impersonating.<\/p>\n<h3>Lessons Learned<\/h3>\n<p>It\u2019s interesting to note that the LLM suggested \u201capple.com\u201d as the target for \u201cmaps-iphone.cloud\u201d as this shows that the LLM can detect things that can sometimes not be detected by string similarity techniques. It also points to a potential limitation in mitigating hallucination using our traditional string similarity techniques. Here, we are starting to consider confidence score along with Registration, SSL Certificate information and, in some cases, content.<\/p>\n<p>However, one must be careful trusting the confidence predictions of LLMs as they are <a href=\"https:\/\/en.wikipedia.org\/wiki\/Large_language_model\" target=\"_blank\"><strong>token predictors and not regressors<\/strong><\/a>. When using <a href=\"https:\/\/en.wikipedia.org\/wiki\/Large_language_model\" target=\"_blank\"><strong>sufficient temperature<\/strong><\/a> to nominate targets, the confidence score can often vary by up to 3 on a 10-point scale. Additionally, we note that while in all these cases the model correctly identified the target, the explanations can be slightly wrong. For example, the first entry shows a clear example of hallucination. The model\u2019s explanation states that \u201cx\u201d was substituted instead of \u201cl\u201d, when in fact the lookalike domain \u201cinfobiox.com\u201d demonstrates an \u201cl\u201d \u2192 \u201ci\u201d substitution (\u201cinfoblox.com\u201d \u2192 \u201cinfobiox.com\u201d). While this provides additional evidence to verify the results, it also shows how a wrong model can still be useful if properly constrained.<\/p>\n<h3>Why it matters<\/h3>\n<p>How does this help protect Infoblox customers? We have now figured out how to make these LLM queries scale to all newly registered domains seen each day. This allows us to protect Infoblox customers against more types of lookalike attacks, including many domains our customers may not consider to be part of their risk profile. We will start by adding this to Zero Day DNS detection and Infoblox Threat Defense feature called \u201cDossier\u201d, followed by adding processes to add to feed domains.<\/p>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n.entry-content ul.list-spacing ul > li {\n    list-style-type: square;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Hallucinating for Fun and Profit<\/span>: Using LLMs to Find Lookalikes without Targets');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lookalike domains are internet domain names that are deliberately made to look very similar to a legitimate, trusted domain\u2014often with the goal of deceiving users. Examples include: \u201ctacobe11.com\u201d versus \u201ctacobell.com\u201d, \u201clogin-outlook.com\u201d versus \u201clogin.outlook.com\u201d or \u201cinfoblocks.com\u201d versus \u201cinfoblox.com\u201d. They are a common tactic for many types of threats on the internet. These can include scams, credential [&hellip;]<\/p>\n","protected":false},"author":417,"featured_media":12848,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[1526,1527,1528,1529,1530],"class_list":{"0":"post-12846","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns-threat-detection","9":"tag-lookalike-domain-detection","10":"tag-llm-cybersecurity-applications","11":"tag-dns-tunneling-detection","12":"tag-phishing-domain-detection","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets<\/title>\n<meta name=\"description\" content=\"Learn how LLMs and embeddings improve DNS threat detection by identifying lookalike domains without target lists, reducing phishing risk and false positives\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets\" \/>\n<meta property=\"og:description\" content=\"Learn how LLMs and embeddings improve DNS threat detection by identifying lookalike domains without target lists, reducing phishing risk and false positives\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-20T15:55:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Darin Johnson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets\" \/>\n<meta name=\"twitter:description\" content=\"Learn how LLMs and embeddings improve DNS threat detection by identifying lookalike domains without target lists, reducing phishing risk and false positives\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Darin Johnson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/\"},\"author\":{\"name\":\"Darin Johnson\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/39e6fcc55b099c15768dd9293106b944\"},\"headline\":\"Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets\",\"datePublished\":\"2026-01-20T15:55:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/\"},\"wordCount\":1206,\"publisher\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets-thumbnail.jpg\",\"keywords\":[\"DNS threat detection\",\"Lookalike domain detection\",\"LLM cybersecurity applications\",\"DNS tunneling detection\",\"Phishing domain detection\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/\",\"url\":\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/\",\"name\":\"Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets\",\"isPartOf\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets-thumbnail.jpg\",\"datePublished\":\"2026-01-20T15:55:05+00:00\",\"description\":\"Learn how LLMs and embeddings improve DNS threat detection by identifying lookalike domains without target lists, reducing phishing risk and false positives\",\"breadcrumb\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#primaryimage\",\"url\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets-thumbnail.jpg\",\"contentUrl\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.infoblox.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/www.infoblox.com\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#website\",\"url\":\"https:\/\/www.infoblox.com\/blog\/\",\"name\":\"blog.infoblox.com\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\/\/www.infoblox.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/39e6fcc55b099c15768dd9293106b944\",\"name\":\"Darin Johnson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/darin-johnson-headshot-96x96.jpg\",\"contentUrl\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/darin-johnson-headshot-96x96.jpg\",\"caption\":\"Darin Johnson\"},\"description\":\"Dr. Darin Johnson is a Principal Data Scientist at Infoblox, where he has led the development of many DNS detection algorithms including ZeroDay DNS, DNS Tunneling, DGAs and Lookalikes. Prior to Infoblox he worked for the Department of Defense as a Data Scientist and Delaware State University as a Professor of Mathematics. He still teaches mathematics and machine learning as an Adjunct Professor at University of Maryland, Baltimore County. His research interests are in machine learning and generative artificial intelligence, large-scale data analysis, streaming applications, and anything related to graph theory, particularly if it relates to cyber security or network analysis.\",\"url\":\"https:\/\/www.infoblox.com\/blog\/author\/darin-johnson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets","description":"Learn how LLMs and embeddings improve DNS threat detection by identifying lookalike domains without target lists, reducing phishing risk and false positives","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/","og_locale":"en_US","og_type":"article","og_title":"Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets","og_description":"Learn how LLMs and embeddings improve DNS threat detection by identifying lookalike domains without target lists, reducing phishing risk and false positives","og_url":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/","og_site_name":"Infoblox Blog","article_published_time":"2026-01-20T15:55:05+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets-thumbnail.jpg","type":"image\/jpeg"}],"author":"Darin Johnson","twitter_card":"summary_large_image","twitter_title":"Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets","twitter_description":"Learn how LLMs and embeddings improve DNS threat detection by identifying lookalike domains without target lists, reducing phishing risk and false positives","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets-thumbnail.jpg","twitter_misc":{"Written by":"Darin Johnson","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/"},"author":{"name":"Darin Johnson","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/39e6fcc55b099c15768dd9293106b944"},"headline":"Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets","datePublished":"2026-01-20T15:55:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/"},"wordCount":1206,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets-thumbnail.jpg","keywords":["DNS threat detection","Lookalike domain detection","LLM cybersecurity applications","DNS tunneling detection","Phishing domain detection"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/","url":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/","name":"Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets-thumbnail.jpg","datePublished":"2026-01-20T15:55:05+00:00","description":"Learn how LLMs and embeddings improve DNS threat detection by identifying lookalike domains without target lists, reducing phishing risk and false positives","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/hallucinating-for-fun-and-profit-using-llms-to-find-lookalikes-without-targets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Hallucinating for Fun and Profit: Using LLMs to Find Lookalikes without Targets"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"blog.infoblox.com","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/39e6fcc55b099c15768dd9293106b944","name":"Darin Johnson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/darin-johnson-headshot-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/darin-johnson-headshot-96x96.jpg","caption":"Darin Johnson"},"description":"Dr. Darin Johnson is a Principal Data Scientist at Infoblox, where he has led the development of many DNS detection algorithms including ZeroDay DNS, DNS Tunneling, DGAs and Lookalikes. Prior to Infoblox he worked for the Department of Defense as a Data Scientist and Delaware State University as a Professor of Mathematics. He still teaches mathematics and machine learning as an Adjunct Professor at University of Maryland, Baltimore County. His research interests are in machine learning and generative artificial intelligence, large-scale data analysis, streaming applications, and anything related to graph theory, particularly if it relates to cyber security or network analysis.","url":"https:\/\/www.infoblox.com\/blog\/author\/darin-johnson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/417"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12846"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12846\/revisions"}],"predecessor-version":[{"id":12850,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12846\/revisions\/12850"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12848"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}