GUIDES
Playbooks
Respond to .ph Domain Alerts
7 min
why ph domains behave differently most internet domains only work if someone has registered them ph domains (used by the philippines) work even when nobody owns them this means you can type any name ending in ph, and it will still load something this is a design choice by the ph registry other domains (like com, net, ca) do not behave this way because of this, alerts involving ph domains need to be reviewed differently from alerts involving normal domains what risks this creates more “noise” in automated systems security tools like flare may alert on ph domains that don’t really exist , because they look active even when they aren’t harder to know if something is truly dangerous since everything resolves, you cannot rely on a quick technical check to know whether a ph domain is real or harmful potential for abuse by bad actors threat actors sometimes choose ph domains because they know tools will treat them differently they can create convincing impersonation pages they can host phishing sites without triggering typical “domain doesn’t exist” signals how to triage “ ph” alerts step 1 — ask “does this domain actually exist?” analysts must check the domain ownership directly through official records a ph domain appearing online does not mean it is real step 2 — check if the domain is hosting anything if the page is blank, generic, or identical to thousands of others, it’s usually harmless noise if the page contains a login form your brand name content asking for credentials anything unusual or unexpected …it should be treated as potentially malicious step 3 — look for brand misuse if the domain includes your company name, product name, or anything resembling it, treat it as high priority , even before technical validation step 4 — ask your analysts for risk classification you should expect the domain to be placed into one of these categories benign / noise — not registered, not owned by anyone suspicious — registered but empty malicious — registered by someone and used to mimic you or collect data step 5 — for malicious domains, proceed with takedown or blocking once analysts confirm risk, treat ph domains like any other malicious domain block it at endpoints report to the registrar add to brand abuse documentation escalate if it contains impersonation or credential harvesting the ph tld behaves differently from almost every other domain type on the internet because it always resolves effective triage requires validating registration using whois/rdap inspecting hosted content checking certificates and historical dns prioritizing brand related keywords treating active or registered ph domains with caution