This report analyzes look-alike domain incidents over six months to determine the volume and most prevalent types of domain threats.